Cyber Warriors

What is Botnet ?

Botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.... The onset of the attack techniques in today's technology, one of the most important botnet attacks that .. In general, considering the, is a type of malicious software...
READMORE
 

Spoof mac on macosx

This tutorial is for mac users only. As i will explain how to spoof your mac address on MacOsx. Mac spoofing is useful! Ok lets start. 1: Open terminal and type.                         Code ----------------------------------------- ifconfig en1 | grep ether ----------------------------------------- 2:...
READMORE
 

Spread your Keylogger&Rat using USB (Auto-run)

1: Creating autorun.inf Open notepad and copy the following code to it.                                         Code --------------------------------------------------------------- [autorun] open=autorun.bat icon=anything.ico ---------------------------------------------------------------- 2:...
READMORE
 

FUD Malware Using Winrar

It  works with everyfile, such as Darkcomet, .Net Files,Executables and every other Files............... 1:So first Download WinRAR 2:Then install it. Now it should be ready for use. 3:You have your Server.exe 4:Now select you Server and add to a Winrar Archive 5:Make sure you check "self-extracting" "solid-Archive" and "Protect...
READMORE
 

100% FUD Email sending keylogger in Visual Basic.

          How to make a email sending keylogger in Visual Basic. 100% Fud You want to steal someone's password but you don't want to spend even a single penny to buy those costly Remote keyloggers present on the net and that's the case with me too.So why not we design our own keylogger. (A remote keylogger...
READMORE
 

RDP Brute Force Tool

xTSCrack is a tool to assist the peneration tester find weak passwords over RDP protocol (3389). It is basically a RDP brute force tool. Features: Test for weak password automatically; Test for weak/user passwords; Wordlist option; Userlist option; Configurable port; Range IP Address audit and more. ...
READMORE
 

Adrmax Keylogger Step by Step Tutorial

what is keylogger ? Keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press. These keyloggers allow not only keyboard keystrokes to be captured but also are often capable of collecting screen captures from the computer. The keys they press...
READMORE
 

XSS Keylogger

XSS Keyloggers is  a simple way to grab informations a user type on a web page.Keylogging is the action of recording the keys struck on a keyboard.A keylogger can be used to spy on someone, grab their passwords, read their conversations or steal their personal informations. 1:Download xss keylogger. 2:Upload these files on...
READMORE
 

DNS-Poison attack

The job of a DNS is to convert the human readable addresses entered  into machine readable IP addresses. For example when you type the URL (http://www.google.com) into the address bar the first thing that occurs is the nearest DNS server is contacted and the IP address of google domain is retrieved. Based on this IP address...
READMORE
 

Sniff VoIP Calls

Hello friends Cyberwarriors are back with Amazing Tutorial Sniffing VoIP Calls With Wireshark....... VoIP phones are implemented in every major organization and they are providing an attack surface for every malicious user that’s knows the basics of hacking. If there is no encryption in the communication media then an attacker...
READMORE
 

Email Spoofer by CyberWarriors

Email is the most comprehensive surveillance system ever created. It’s easy for us to think that we are safe behind our web browsers and that nobody is watching what we do. The reality is that your online activities are constantly logged, tracked, and indexed by big business and government agencies. To keep your emails away from...
READMORE